Ján Jančár
Ján Jančár
Zweryfikowany adres z mail.muni.cz - Strona główna
Cytowane przez
Cytowane przez
Minerva: The curse of ECDSA nonces: Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
J Jancar, V Sedlacek, P Svenda, M Sys
IACR Transactions on Cryptographic Hardware and Embedded Systems, 281-308, 2020
“They’re not that hard to mitigate”: What cryptographic library developers think about timing attacks
J Jancar, M Fourné, DDA Braga, M Sabt, P Schwabe, G Barthe, ...
2022 IEEE Symposium on Security and Privacy (SP), 632-649, 2022
The state of tooling for verifying constanttimeness of cryptographic implementations
J Jancar
A formula for disaster: a unified approach to elliptic curve special-point-based attacks
V Sedlacek, JJ Chi-Domínguez, J Jancar, BB Brumley
International Conference on the Theory and Application of Cryptology and …, 2021
Fooling primality tests on smartcards
V Sedlacek, J Jancar, P Svenda
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
Optical cryptanalysis: Recovering cryptographic keys from power led light fluctuations
B Nassi, O Vayner, E Iluz, D Nassi, J Jancar, D Genkin, E Tromer, B Zadov, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
“These results must be false”: A usability evaluation of constant-time analysis tools
M Fourné, DDA Braga, J Jancar, M Sabt, P Schwabe, G Barthe, ...
33th USENIX Security Symposium (USENIX Security 2024), 2024
Security considerations for elliptic curve domain parameters selection
J Jančár
Masaryk university, 0
sec-certs: Examining the security certification practice for better vulnerability mitigation
A Janovsky, J Jancar, P Svenda, Ł Chmielewski, J Michalik, V Matyas
Computers & Security, 103895, 2024
Chain of trust: Unraveling the references among Common Criteria certified products
A Janovsky, Ł Chmielewski, P Svenda, J Jancar, V Matyas
arXiv preprint arXiv:2404.14246, 2024
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–10